[cryptography] Intel RNG

Joachim Strömbergson Joachim at Strombergson.com
Wed Jun 20 02:37:11 EDT 2012


Aloha!

On 2012-06-20 05:32 , James A. Donald wrote:
> If intel told me how it worked, and provided low level access to raw
> unwhitened output, I could find pretty good evidence that the low level
> randomness generator was working as described, and perfect evidence that
> the whitener was working as described.  Certification does not tell me
> anything much.

Good point. And even more so. What I think we would like to have is:

(1) Read access to the raw output of the entropy source.
(2) Possibly read access after whitening.
(3) Write access to inputs of the PRNG

This would allow us to probe that the whole chain works as intended with
KATs for the PRNG part.

This would still not prove that Intel, when MUXing in data from (1)/(2)
into the PRNG actually does something completely different.

-- 
Med vänlig hälsning, Yours

Joachim Strömbergson - Alltid i harmonisk svängning.
========================================================================




-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 267 bytes
Desc: OpenPGP digital signature
URL: <http://lists.randombit.net/pipermail/cryptography/attachments/20120620/e43a1616/attachment.asc>


More information about the cryptography mailing list